-
Notifications
You must be signed in to change notification settings - Fork 4.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Vault LDAP authentication does not check if a user is diabled #1568
Comments
I've found that the mount's default TTL can be set with the following:
However, it would still be best to double check with LDAP that the account hasn't been deactivated. |
All tokens have a TTL. You can use Is there a standard way to check for account disabling on LDAP servers? |
Despite using mount-tune on 0.6, after logging in with a new user to create a new token, there is still no TTL
Is it possible I'm doing something wrong? |
Root tokens do not expire and so have no TTL. I didn't figure that you were using a root token since they're generally not recommended for use, ever. |
Aha, that works, thank you. |
After doing some testing, I have found that when an account is disabled in vault's ldap auth backend, the token that was created for that user to connect remains valid.
By default, there is no TTL for the token generated by the LDAP backend, and there appears to be no method to set one. This means that if someone leaves an organization, if they take their token with them, they will still be able to connect to vault.
Either vault needs to connect to ldap each time to see if the account is enabled or not, it needs the ability to set a sufficiently low ttl - like 5 minutes, or ideally both.
The text was updated successfully, but these errors were encountered: